CVE-2022-49563

5.5 MEDIUM

📋 TL;DR

This vulnerability in the Linux kernel's QAT crypto driver allows an attacker to trigger an integer underflow when processing RSA encryption/decryption requests with oversized source buffers. This could lead to memory corruption or system crashes. Systems using Intel QuickAssist Technology (QAT) hardware acceleration for RSA operations are affected.

💻 Affected Systems

Products:
  • Linux kernel with QAT driver
Versions: Linux kernel versions before the fix commits (specific versions vary by distribution)
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when QAT hardware acceleration is enabled and RSA operations are being performed through the affected driver.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic or system crash leading to denial of service, with potential for memory corruption that could be leveraged for privilege escalation or arbitrary code execution in kernel context.

🟠

Likely Case

System instability, crashes, or denial of service affecting cryptographic operations on QAT-enabled systems.

🟢

If Mitigated

Minimal impact if systems don't use QAT RSA operations or have proper input validation in place.

🌐 Internet-Facing: LOW - Requires local access or ability to trigger specific cryptographic operations through existing services.
🏢 Internal Only: MEDIUM - Could be exploited by authenticated users or processes with access to QAT cryptographic functions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to trigger RSA operations through the QAT driver with malicious input parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in kernel commits: 4d6d2adce08788b7667a6e58002682ea1bbf6a79, 9714061423b8b24b8afb31b8eb4df977c63f19c4, f993321e50ba7a8ba4f5b19939e1772a921a1c42

Vendor Advisory: https://git.kernel.org/stable/c/4d6d2adce08788b7667a6e58002682ea1bbf6a79

Restart Required: Yes

Instructions:

1. Update Linux kernel to version containing the fix commits. 2. Reboot system to load new kernel. 3. Verify QAT driver is functioning correctly post-update.

🔧 Temporary Workarounds

Disable QAT RSA operations

linux

Temporarily disable QAT hardware acceleration for RSA operations

modprobe -r qat_rsa
echo 'blacklist qat_rsa' > /etc/modprobe.d/disable-qat-rsa.conf

🧯 If You Can't Patch

  • Disable QAT hardware acceleration completely if not required
  • Implement strict access controls to limit who can perform cryptographic operations

🔍 How to Verify

Check if Vulnerable:

Check kernel version and verify if QAT driver is loaded: lsmod | grep qat

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version includes fix commits and test RSA operations through QAT

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • QAT driver error messages
  • Cryptographic operation failures

Network Indicators:

  • None - local vulnerability

SIEM Query:

source="kernel" AND ("panic" OR "oops") AND "qat"

🔗 References

📤 Share & Export